Sciweavers

339 search results - page 27 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
APLAS
2007
ACM
15 years 6 months ago
More Typed Assembly Languages for Confidentiality
We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgment...
Dachuan Yu
122
Voted
IJPP
2011
107views more  IJPP 2011»
14 years 9 months ago
Parallel Iterator for Parallelizing Object-Oriented Applications
With the advent of multi-core processors, desktop application developers must finally face parallel computing and its challenges. A large portion of the computational load in a p...
Nasser Giacaman, Oliver Sinnen
133
Voted
CARDIS
2004
Springer
216views Hardware» more  CARDIS 2004»
15 years 8 months ago
Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard
: We present two architectures for protecting a hardware implementation of AES against side-channel attacks known as Differential Fault Analysis attacks. The first architecture, wh...
Mark G. Karpovsky, Konrad J. Kulikowski, Alexander...
124
Voted
PR
2008
146views more  PR 2008»
15 years 2 months ago
Retrieval of machine-printed Latin documents through Word Shape Coding
This paper reports a document retrieval technique that retrieves machine-printed Latin-based document images through word shape coding. Adopting the idea of image annotation, a wo...
Shijian Lu, Chew Lim Tan
90
Voted
VTC
2007
IEEE
15 years 8 months ago
A NETwork COding based Multicasting (NETCOM) over IEEE 802.11 Multi-hop
— In this paper, we present an analysis of various multicast schemes over IEEE 802.11 Multi-hop. Analyzing performance of wireless multicasting communication is important because...
Yong Ho Kim, Nan Sol Seo, Young Yong Kim